Skip to Content

Electronics, Volume 14, Issue 21

2025 November-1 - 222 articles

Cover Story: This research addresses wildlife monitoring challenges in remote locations through a novel IoT ecosystem combining long-range LoRa/nRF24L01 radio with Monte Carlo progressive sampling. Instead of transmitting complete images, the system sends randomly selected pixels that incrementally reconstruct thumbnails. The PIQE metric provides computationally efficient quality assessment, enabling automatic transmission control on resource-constrained platforms. When reconstruction quality reaches acceptable thresholds, transmission pauses pending operator decision. Laboratory validation confirms that the approach achieves significant bandwidth reduction while maintaining image quality sufficient for wildlife identification. Results demonstrate technical feasibility for sustainable, low-cost environmental monitoring in infrastructure-limited scenarios. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (222)

  • Article
  • Open Access
572 Views
19 Pages

6 November 2025

This paper presents a novel hybrid modulation technique for Asymmetrical Cascaded H-Bridge Multilevel Inverters (ACHBMLIs), specifically designed to enhance both efficiency and harmonic performance. Unlike conventional strategies, the proposed method...

  • Article
  • Open Access
1,153 Views
12 Pages

6 November 2025

In this study, we investigate the effects of rapid thermal annealing (RTA) in a nitrogen ambient on Al0.8Sc0.2N metal–ferroelectric–metal capacitors. The RTA treatment of up to 13 min on an as-deposited AlScN film markedly improves electr...

  • Article
  • Open Access
1 Citations
669 Views
23 Pages

Cooperative NOMA with RIS Assistance for Short-Packet Communications Under Hardware Impairments

  • Wenbin Song,
  • Dechuan Chen,
  • Jin Li,
  • Xingang Zhang and
  • Zhipeng Wang

6 November 2025

Ultra-reliable low-latency communication (URLLC) presents significant challenges in simultaneously guaranteeing stringent latency bounds, ultra-high reliability, and efficient resource utilization under dynamic channel conditions. To address these jo...

  • Article
  • Open Access
842 Views
31 Pages

6 November 2025

This study proposes an integrated control–optimization framework for harmonic mitigation in two-level, grid-connected inverters with battery energy storage operating under unbalanced grid conditions. A proportional–resonant controller in...

  • Article
  • Open Access
845 Views
30 Pages

6 November 2025

The increasing demand for data utilization has renewed attention to the trade-off between privacy protection and data utility, particularly concerning pseudonymized datasets. Traditional methods for evaluating re-identification risk and utility often...

  • Article
  • Open Access
1 Citations
710 Views
15 Pages

A Steganalysis Method Based on Relationship Mining

  • Ruiyao Yang,
  • Yu Yang,
  • Linna Zhou and
  • Xiangli Meng

6 November 2025

Steganalysis is a critical research direction in the field of information security. Traditional approaches typically employ convolution operations for feature extraction, followed by classification on noise residuals. However, since steganographic si...

  • Article
  • Open Access
1 Citations
1,801 Views
34 Pages

6 November 2025

This study investigates how increasing prompt complexity affects the performance of Large Language Models (LLMs) across multiple Natural Language Processing (NLP) tasks. We introduce an incremental evaluation framework where six tasks—JSON form...

  • Article
  • Open Access
1,036 Views
23 Pages

Data Secure Storage Mechanism for Trustworthy Data Space

  • Xinyi Yang,
  • Qicheng Luo,
  • Jiang Xu and
  • Qinghong Cao

6 November 2025

In today’s rapidly evolving data environment, secure and efficient storage solutions are fundamental to supporting the robust development of the data economy. Trustworthy data space serves as an innovative technological framework for addressing...

  • Article
  • Open Access
496 Views
21 Pages

6 November 2025

Indoor localization based on range measurements in wireless sensor networks involves nonlinear measurement models and is susceptible to non-Gaussian noise, which is associated with complex indoor environments. While particle filters (PFs) are well-su...

  • Article
  • Open Access
1 Citations
951 Views
25 Pages

Renewable-Aware Container Migration in Multi-Data Centers

  • Xiong Fu,
  • Zhangchi Ma,
  • Xuezheng Shao,
  • Guo Chen and
  • Ji Qi

6 November 2025

The proliferation of artificial intelligence (AI) and online services has significantly escalated the demand for computing and storage resources, which are fundamentally enabled by cloud computing infrastructure. As the backbone of cloud computing se...

  • Article
  • Open Access
577 Views
20 Pages

5 November 2025

To address the limitations of single-sensor perception in inland vessel monitoring and the lack of robustness of traditional tracking methods in occlusion and maneuvering scenarios, this paper proposes a hierarchical multi-target tracking framework t...

  • Article
  • Open Access
993 Views
24 Pages

5 November 2025

Bug localization is a critical task in large-scale software maintenance, as it reduces exploration costs and enhances system reliability. However, existing approaches face limitations due to semantic mismatches between bug reports and source code, in...

  • Article
  • Open Access
475 Views
18 Pages

5 November 2025

The undifferenced and uncombined (UDUC) model preserves raw code and carrier-phase observations for each frequency, avoiding differencing or ionosphere-free combinations. This approach enables the direct estimation of atmospheric parameters. However,...

  • Article
  • Open Access
547 Views
19 Pages

5 November 2025

Zero-shot learning (ZSL) aims to categorize target classes with the aid of semantic knowledge and samples from previously seen classes. In this process, the alignment of visual and attribute modality features is key to successful knowledge transfer....

  • Article
  • Open Access
2 Citations
1,324 Views
19 Pages

Robust OTFS-ISAC for Vehicular-to-Base Station End-to-End Sensing and Communication

  • Khurshid Hussain,
  • Esraa Musa Ali,
  • Waeed Hussain,
  • Ali Raza and
  • Dalia H. Elkamchouchi

5 November 2025

This paper presents an orthogonal time–frequency space (OTFS)-based integrated sensing and communication (ISAC) framework for vehicular-to-base-station (V2B) scenarios, where a synthetic road environment models vehicular mobility and multipath...

  • Article
  • Open Access
589 Views
29 Pages

A Secure and Efficient KA-PRE Scheme for Data Transmission in Remote Data Management Environments

  • JaeJeong Shin,
  • Deok Gyu Lee,
  • Daehee Seo,
  • Wonbin Kim and
  • Su-Hyun Kim

5 November 2025

In recent years, remote data management environments have been increasingly deployed across diverse infrastructures, accompanied by a rapid surge in the demand for sharing and collaborative processing of sensitive data. Consequently, ensuring data se...

  • Article
  • Open Access
670 Views
21 Pages

5 November 2025

Steady-state visual evoked potential (SSVEP)-based brain–computer interface (BCI) technology offers a promising solution for wheelchair control by translating neural signals into navigation commands. A major challenge—signal noise caused...

  • Article
  • Open Access
1 Citations
609 Views
37 Pages

5 November 2025

Task scheduling in cloud computing becomes significantly more challenging under Distributed Denial-of-Service (DDoS) attacks, as malicious workload injection disrupts resource availability and degrades Quality of Service (QoS). To address this issue,...

  • Article
  • Open Access
467 Views
21 Pages

Non-Invasive Showering Estimation Utilizing Household-Adaptive Models and Washing Time Data

  • Takuya Nakata,
  • Jiro Hashizume,
  • Akihiro Yanada and
  • Masahide Nakamura

5 November 2025

This study introduces a dual-proxy framework for household-adaptive, non-invasive shower detection using standard water-heater logs. The framework leverages proxy at two complementary levels: a feature-level proxy (washing_seconds) that captures wash...

  • Article
  • Open Access
985 Views
24 Pages

5 November 2025

This study addresses the common challenges in medical image segmentation and recognition, including boundary ambiguity, scale variation, and the difficulty of modeling long-range dependencies, by proposing a unified framework based on a hierarchical...

  • Article
  • Open Access
817 Views
17 Pages

5 November 2025

Current denoising algorithms in infrared imaging systems predominantly target either high-frequency stripe noise or Gaussian noise independently, failing to adequately address the prevalent hybrid noise in real-world scenarios. To tackle this challen...

  • Article
  • Open Access
430 Views
18 Pages

5 November 2025

The increasing scale and complexity of graph-structured data necessitate efficient parallel training strategies for graph neural networks (GNNs). The effectiveness of these strategies hinges on the quality of graph feature representation. To this end...

  • Article
  • Open Access
2 Citations
1,659 Views
12 Pages

Investigation on Electromagnetic Immunity of Unmanned Aerial Vehicles in Electromagnetic Environment

  • Roman Kubacki,
  • Rafał Przesmycki,
  • Marek Bugaj and
  • Dariusz Laskowski

5 November 2025

The increasing complexity of the electromagnetic environment poses an increasing risk to unmanned aerial vehicles (UAVs) operating in airspaces subject to adverse electromagnetic effects. This paper investigates the potential electromagnetic interfer...

  • Article
  • Open Access
1 Citations
1,109 Views
21 Pages

PhishGraph: A Disk-Aware Approximate Nearest Neighbor Index for Billion-Scale Semantic URL Search

  • Dimitrios Karapiperis,
  • Georgios Feretzakis and
  • Sarandis Mitropoulos

5 November 2025

The proliferation of algorithmically generated malicious URLs necessitates a shift from syntactic detection to semantic analysis. This paper introduces PhishGraph, a disk-aware Approximate Nearest Neighbor (ANN) search system designed to perform bill...

  • Article
  • Open Access
993 Views
19 Pages

Adaptive Service Migration for Satellite Edge Computing via Deep Reinforcement Learning

  • Lu Zhao,
  • Lulu Guo,
  • Siyi Ni,
  • Wanqi Qian,
  • Kaixiang Lu,
  • Yong Xie and
  • Jian Zhou

5 November 2025

In this paper, we investigate the Adaptive Service Migration (ASM) problem in dynamic satellite edge computing networks, focusing on Low Earth Orbit satellites with time-varying inter-satellite links. We formulate the ASM problem as a constrained opt...

  • Article
  • Open Access
581 Views
18 Pages

Reliable Backscatter Communication for Distributed PV Systems: Practical Model and Experimental Validation

  • Xu Liu,
  • Wu Dong,
  • Xiaomeng He,
  • Wei Tang,
  • Kang Liu,
  • Binyang Yan,
  • Zhongye Cao,
  • Da Chen and
  • Wei Wang

5 November 2025

Backscatter technologies promise to enable large-scale, battery-free sensor networks by modulating and reflecting ambient radio frequency (RF) carriers rather than generating new signals. Translating this potential into practical deployments—su...

  • Article
  • Open Access
944 Views
42 Pages

5 November 2025

An early and precise diagnosis is essential for successful intervention in Alzheimer’s disease (AD), a progressive neurological illness. In this study, we present a deep learning-based framework for multiclass classification of AD severity leve...

  • Article
  • Open Access
1,763 Views
32 Pages

RDBAlert: An AI-Driven Automated Tool for Effective Identification of Victims’ Personal Information in Ransomware Data Breaches

  • Juan Manuel Tejada-Triviño,
  • Elvira Castillo-Fernández,
  • Pedro García-Teodoro and
  • José Antonio Gómez-Hernández

4 November 2025

Ransomware attacks are increasingly resulting in the public leakage of sensitive personal data, affecting both individuals and organizations worldwide. Aimed to inform victims when their personal information is compromised, this paper introduces RDBA...

  • Article
  • Open Access
535 Views
20 Pages

WIS: A Technology of Wireless Non-Contact Incremental Training Sensing

  • Guanjie Wang,
  • Yu Wu,
  • Hongyu Sun,
  • Xinyue Zhang,
  • Wanjia Li and
  • Yanhua Dong

4 November 2025

Wireless contactless human activity sensing is a new type of sensing method that uses the propagation characteristics of wireless signals to accurately perceive and understand human behavior. However, facing the huge amount of newly generated data an...

  • Article
  • Open Access
481 Views
18 Pages

4 November 2025

Safeguarding data confidentiality and enforcing precise access regulation in cloud platforms continue to be major research concerns. Attribute-based encryption (ABE) offers a versatile framework for policy-driven control, whereas public key encryptio...

  • Article
  • Open Access
1 Citations
675 Views
14 Pages

Enhancing Distribution Network Resilience Using Genetic Algorithms

  • Theodoros Ι. Maris,
  • Christos Christodoulou and
  • Valeri Mladenov

4 November 2025

Ensuring the resilience and efficiency of modern distribution networks is increasingly critical in the presence of distributed energy resources (DERs). This study presents a multi-objective optimization framework based on a Genetic Algorithm (GA) to...

  • Article
  • Open Access
410 Views
11 Pages

4 November 2025

This study investigates the enhancement in spectral efficiency in wireless networks through the application of Non-Orthogonal Multiple Access (NOMA), particularly within the context of imminent 5G networks. Despite its recognized potential, the appli...

  • Review
  • Open Access
4,906 Views
38 Pages

4 November 2025

Metalenses, a novel class of advanced planar optical devices based on metasurfaces developed in recent years, enable the design of incident light’s amplitude, phase, and polarization with high degrees of freedom to meet application requirements...

  • Article
  • Open Access
1,348 Views
20 Pages

Enhancing the Detection of Cyber-Attacks to EV Charging Infrastructures Through AI Technologies

  • Roberta Terruggia,
  • Alberto Maldarella,
  • Giovanna Dondossola and
  • Gabriele Webber

4 November 2025

The increasing digitalization of energy infrastructures, particularly electric vehicle (EV) charging systems, has expanded their vulnerability to cyber threats. This paper presents a modular AI-driven platform for detecting attacks on EV charging inf...

  • Article
  • Open Access
789 Views
20 Pages

Wavelet-Based Time–Frequency Feature Fusion for Violence Detection

  • Fan Zhang,
  • Jing Peng,
  • Jinxiao Wang,
  • Xuan Liu,
  • Lin Cao,
  • Kangning Du and
  • Yanan Guo

4 November 2025

In the past few years, feature fusion-based violence detection has made remarkable progress. However, existing detection methods primarily focus on temporal feature analysis, which may result in an insufficient representation of the subtle variations...

  • Article
  • Open Access
784 Views
34 Pages

3 November 2025

The increasing adoption of smart home technologies introduces significant cybersecurity and forensic challenges. This necessitates a shift from traditional reactive digital forensics to a more proactive approach to safeguarding these environments. Th...

  • Article
  • Open Access
1,329 Views
37 Pages

3 November 2025

The widespread use of leetspeak and dialectal Arabic on social media poses a critical challenge to automated hate speech detection systems. Existing Arabic NLP models, largely trained on Modern Standard Arabic (MSA), struggle with obfuscated, noisy,...

  • Article
  • Open Access
717 Views
19 Pages

3 November 2025

This study investigates the vulnerability of Internet of Things (IoT) devices to climate change in Kazakhstan, where extreme seasonal variability and rising climate risks threaten device reliability. Using high-resolution climate projection data from...

  • Article
  • Open Access
1,387 Views
14 Pages

Zero-Shot SAM for Food Image Segmentation

  • Saeed S. Alahmari,
  • Michael R. Gardner and
  • Tawfiq Salem

3 November 2025

Recent advances in foundation models have enabled strong zero-shot performance across vision tasks, yet their effectiveness for fine-grained domains such as food image segmentation remains underexplored. This study investigates the zero-shot capabili...

  • Article
  • Open Access
646 Views
13 Pages

3 November 2025

Due to the diverse needs of users, such as the requirement for rapid charging in time-sensitive situations and the need to minimize battery power consumption to extend battery life when the device is idle, a wireless charging system that combines fas...

  • Article
  • Open Access
513 Views
20 Pages

Twin-Space Decoupling and Interaction for Efficient Vision-Language Transfer

  • Wei Liang,
  • Junqiang Li,
  • Zhengkai Guo,
  • Zhiwei Peng,
  • Xiaocui Li,
  • Junfeng Yang,
  • Chuang Li and
  • Wei Long

3 November 2025

Pre-trained visual language models have become excellent basic models for many downstream tasks in transfer learning. However, due to the serious gap between the data scale of downstream tasks and the large-scale data used by pre-trained models, migr...

  • Article
  • Open Access
764 Views
17 Pages

2 November 2025

The boundaries of planar building components characterize the structural outline of buildings and are of great importance in applications such as indoor model reconstruction and localization. However, traditional methods for extracting boundary point...

  • Article
  • Open Access
2,605 Views
17 Pages

Leveraging Large Language Models for Real-Time UAV Control

  • Kheireddine Choutri,
  • Samiha Fadloun,
  • Ayoub Khettabi,
  • Mohand Lagha,
  • Souham Meshoul and
  • Raouf Fareh

2 November 2025

As drones become increasingly integrated into civilian and industrial domains, the demand for natural and accessible control interfaces continues to grow. Conventional manual controllers require technical expertise and impose cognitive overhead, limi...

  • Article
  • Open Access
1,122 Views
20 Pages

On-Device Federated Learning for Energy-Efficient Smart Irrigation

  • Zohra Dakhia,
  • Alessia Lazzaro,
  • Mohamed Riad Sebti,
  • Mariateresa Russo and
  • Massimo Merenda

2 November 2025

This study presents a novel federated learning (FL) methodology implemented directly on STM32-based microcontrollers (MCUs) for energy-efficient smart irrigation. To the best of our knowledge, this is the first work to demonstrate end-to-end FL train...

  • Article
  • Open Access
713 Views
21 Pages

1 November 2025

In this paper, virtual synchronous generator (VSG) technology is innovatively introduced into the distributor-unified power flow controller (D-UPFC) control to simulate the power generation characteristics of the synchronous generator. Concepts such...

  • Article
  • Open Access
1 Citations
816 Views
23 Pages

31 October 2025

Virtual synchronous generator (VSG) simulates the dynamic characteristics of synchronous generator, offering significant advantages in flexibly adjusting virtual inertia and damping parameters. However, their dynamic stability is susceptible to const...

  • Article
  • Open Access
634 Views
25 Pages

31 October 2025

Under the tightening carbon reduction policies, port microgrids face the challenge of optimizing the installed capacity of multiple power generation types to reduce operating costs and increase renewable energy penetration. We develop a bi-level cost...

  • Article
  • Open Access
904 Views
33 Pages

Small-Signal Modeling, Comparative Analysis, and Gain-Scheduled Control of DC–DC Converters in Photovoltaic Applications

  • Vipinkumar Shriram Meshram,
  • Fabio Corti,
  • Gabriele Maria Lozito,
  • Luigi Costanzo,
  • Alberto Reatti and
  • Massimo Vitelli

31 October 2025

This paper presents an innovative approach to the modeling and dynamic analysis of DC–DC converters in photovoltaic applications. Departing from traditional studies that focus on the transfer function from duty cycle to output voltage, this wor...

  • Article
  • Open Access
1,281 Views
14 Pages

31 October 2025

Crowdsourced delivery plays a key role in fresh food retailing, where tight time limits and perishability require fast, reliable fulfillment. However, real-time order–courier assignment is challenging because orders arrive in bursts, couriers&r...

  • Article
  • Open Access
1,003 Views
20 Pages

31 October 2025

An integrated ESP32-based measurement system called PV-Scope is presented for real-time photovoltaic (PV) module efficiency characterization and small off-grid system testing under field conditions. The system includes pyranometer-calibrated irradian...

of 5

XFacebookLinkedIn
Electronics - ISSN 2079-9292